https://bugzilla.mindrot.org/show_bug.cgi?id=2143

Petr Cerny [:hrosik] <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |[email protected]

--- Comment #5 from Petr Cerny [:hrosik] <[email protected]> ---
Created attachment 3044
  --> https://bugzilla.mindrot.org/attachment.cgi?id=3044&action=edit
generally skip throwing away opened sockets on EADDRNOTAVAIL

I'm suppose the same could (in the future) happen for IPv4 (or other
protocols), it might be better not to limit it to IPv6.

Darren, do you have any concerns about this sort of limiting? AFAIU,
the only way CVE-2008-1483 could creep back in is that someone enables
disabled protocol and starts listening on the same port that is already
used (with the address family that was available at the moment the
connection was established).

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
_______________________________________________
openssh-bugs mailing list
[email protected]
https://lists.mindrot.org/mailman/listinfo/openssh-bugs

Reply via email to